Advances in cryptology - CRYPTO 2007 : (Record no. 677102)

001 - CONTROL NUMBER
control field ocn184932472
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
additional material characteristics m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field crmn ---mucun|
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 071220s2007 gw a ob 101 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency GW5XE
Language of cataloging eng
Transcribing agency GW5XE
Modifying agency GW5XE
-- W2U
-- YDXCP
-- HNK
-- BTCTA
-- AU@
-- CEF
-- YNG
-- NUI
-- CNTRU
-- COO
-- OCLCQ
-- IDEBK
-- OCLCQ
019 ## -
-- 165039228
-- 177508531
-- 227334238
-- 288252945
-- 320973650
-- 466119619
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540741435
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3540741437
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3540741429
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540741428
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 661096985X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9786610969852
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 11511927
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000042808995
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000042438379
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000042841509
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 13657818
029 1# - (OCLC)
OCLC library identifier HEBIS
System control number 192085115
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)184932472
Canceled/invalid control number (OCoLC)165039228
-- (OCoLC)177508531
-- (OCoLC)227334238
-- (OCoLC)288252945
-- (OCoLC)320973650
-- (OCoLC)466119619
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C79 2007
072 #7 - SUBJECT CATEGORY CODE
Subject category code QA
Source lcco
049 ## - LOCAL HOLDINGS (OCLC)
Holding library TEXA
090 #4 - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.A25
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) C79 2007
111 2# - MAIN ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element CRYPTO (Conference)
Number of part/section/meeting (27th :
Date of meeting 2007 :
Location of meeting Santa Barbara, Calif.)
245 10 - TITLE STATEMENT
Title Advances in cryptology - CRYPTO 2007 :
Remainder of title 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings /
Statement of responsibility, etc Alfred Menezes (ed.).
246 30 - VARYING FORM OF TITLE
Title proper/short title CRYPTO 2007
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Berlin :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2007.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xiv, 630 p.) :
Other physical details ill.
490 0# - SERIES STATEMENT
Series statement Springer
490 1# - SERIES STATEMENT
Series statement Lecture notes in computer science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 4622
500 ## - GENERAL NOTE
General note International conference proceedings.
500 ## - GENERAL NOTE
General note "International Association for Cryptologic Research"--Pref.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Practical cryptanalysis of SFLASH / Vivien Dubois ... [et al.] -- Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 / Pierre-Alain Fouque, Gaetan Leurent, and Phong Q. Nguyen -- How should we solve search problems privately? / Amos Beimel ... [et al.] -- Public key encryption that allows PIR queries / Dan Boneh ... [et al.] -- Information security economics--and beyond / Ross Anderson and Tyler Moore -- Cryptography with constant input locality / Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz -- Universally-composable two-party computation in two rounds / Omer Horvitz and Jonathan Katz -- Indistinguishability amplification / Ueli Maurer, Krzysztof Pietrzak, and Renato Renner -- A hybrid lattice-reduction and meet-in-the-middle attack against NTRU / Nick Howgrave-Graham -- Improved analysis of kannan's shortest lattice vector algorithm (extended abstract) / Guillaume Hanrot and Damien Stehl -- Domain extension of public random functions: beyond the birthday barrier / Ueli Maurer and Stefano Tessaro Random oracles and auxiliary input / Dominique Unruh -- Security-amplifying combiners for collision-resistant hash functions / Marc Fischlin and Anja Lehmann -- Hash functions and the (amplified) boomerang attack / Antoine Joux and Thomas Peyrin -- Amplifying collision resistance: a complexity-theoretic treatment / Ran Canetti ... [et al.] -- How many oblivious transfers are needed for secure multiparty computation? / Danny Harnik, Yuval Ishai, and Eyal Kushilevitz -- Simulatable VRFs with applications to multi-theorem NIZK / Melissa Chase and Anna Lysyanskaya -- Cryptography in the multi-string model / Jens Groth and Rafail Ostrovsky -- Secure identification and QKD in the bounded-quantum-storage model / Ivan B. Damgard -- A tight high-order entropic quantum uncertainty relation with applications / Ivan B. Damgard -- Finding small roots of bivariate integer polynomial equations: a direct approach / Jean-Sebastien Coron -- A polynomial time attack on RSA with private CRT-exponents smaller than N⁰̇⁰⁷³ / Ellen Jochemsz and Alexander May -- Invertible Universal hashing and the TET encryption mode / Shai Halevi -- Reducing trust in the PKG in identity based cryptosystems / Vipul Goyal -- Pirate evolution: how to make the most of your traitor keys / Aggelos Kiayias and Serdar Pehlivanoglu -- A security analysis of the NIST SP 800-90 elliptic curve random number generator / Daniel R.L. Brown and Kristian Gjøsteen -- A generalization of DDH with applications to protocol analysis and computational soundness / Emmanuel Bresson ... [et al.] -- Chernoff-type direct product theorems / Russell Impagliazzo, Ragesh Jaiswal, and Valentine Kabanets -- Rerandomizable RCCA encryption / Manoj Prabhakaran and Mike Rosulek -- Deterministic and efficiently searchable encryption / Mihir Bellare, Alexandra Boldyreva, and Adam O'Neill -- Secure hybrid encryption from weakened key encapsulation / Dennis Hofheinz and Eike Kiltz -- Scalable and unconditionally secure multiparty computation / Ivan Damgard and Jesper Buus Nielsen -- On secure multi-party computation in black-box groups / Yvo Desmedt ... [et al.] -- A note on secure computation of the Moore-Penrose pseudoinverse and its application to secure linear algebra / Ronald Cramer, Eike Kiltz, and Carles Padr.
520 8# - SUMMARY, ETC.
Summary, etc Annotation
Expansion of summary note This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. Thirty-three full papers are presented along with one important invited lecture. The papers address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis. In addition, readers will discover many advanced and emerging applications.
588 ## -
-- Description based on print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control
Form subdivision Congresses.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
Form subdivision Congresses.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Menezes, A. J.
Fuller form of name (Alfred J.),
Dates associated with a name 1965-
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element International Association for Cryptologic Research.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.).
Title Advances in cryptology - CRYPTO 2007.
Place, publisher, and date of publication Berlin : Springer, 2007
International Standard Book Number 9783540741428
-- 3540741429
Record control number (OCoLC)166763853
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture notes in computer science ;
Volume number/sequential designation 4622.
-- 0302-9743
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/978-3-540-74143-5">http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/978-3-540-74143-5</a>
Link text Click here to view this ebook.
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
Platform Springer
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
          UT Tyler Online UT Tyler Online Online 2006-05-09 2006C00338 QA76.9.A25 C79 2007 ocn184932472 2012-01-24 http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/978-3-540-74143-5 2012-01-24 Electronic Book